Describe the lan wan internet intranet and extranet

Assignment Help Computer Network Security
Reference no: EM131123900

1: Jezreel, great post!! Building a network should raise questions, it's not an easy solution and what may work for one, may not work for another, or the same way. And for these reasons: "creating policies are necessary," they should explain:

The why (logic)
The how (processes involved)
The locations (addresses and connections

Documentation saves time, helps trouble shoot, and can help with organization. Another important aspect to consider is data. Class, with your scenarios, please share the following:

Type of data

2: WLAN wireless local area network I think will be my choice network to plan some policy for security. And when I think about it I'm asking for more of a problem. I believe wireless network with signal beginning sent across the air waves is not as secure as a hard wire network. WAN WIDE Area network can send signal across a small city a hard line connection may have a high cost levels compared to the wireless methods.

3: Please describe the following and share which you plan to apply to your scenario?

o Local Area Network (LAN)
o Wide Area Network (WAN)
o Internet
o intranet
o extranet.

Reference no: EM131123900

Development of a new information system

Willowbrook School is a small private school that has retained your services as a systems analyst to assist in the development of a new information system for the school's a

Security through obscurity in a computer situation

Give an example of security through obscurity in a computer situation. Give an example of security through obscurity in a situation not involving computers. Is security thro

What will be public values transmit for commuication

Alice and Bob choose the numbers 6 and 10 privately. What will be the public values they transmit and what would be the final secret computed?

Critically evaluate the system abc company uses

Critically evaluate the system ABC Company uses. Identify possible security risks and evaluate the relative threat posed by those risks. Identify and explain methods, if any

Mobile technologies and commerce

Your attention in this paper can be focused on any of the following topics covered in our text: · Information Management / IT Architecture. · Database, Data, W

What are the differences between a policy and a standard

What are the differences between a policy, a standard, and a guideline. What are three types of security policies? Where would each policy type be applicable for use of the we

What should be minimum key size increase to meet objective

Considering the continuous increase in computer speed, the company decided to increase the size of the encryption key so that the time to break the encryption become more th

Principles of computer security and what mechanisms

What are the three ‘principles' of computer security and what ‘mechanisms' can be used in achieving these principles? Explain the role of a digital signature in information se


Write a Review

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd